Skip to content

Commit 7fa922d

Browse files
Merge pull request #85045 from v-viinde/expensifyupdate
Product Backlog Item 789508: SaaS App Tutorial: Expensify Update
2 parents e032067 + a0ec62a commit 7fa922d

File tree

1 file changed

+28
-25
lines changed

1 file changed

+28
-25
lines changed

articles/active-directory/saas-apps/expensify-tutorial.md

Lines changed: 28 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: tutorial
16-
ms.date: 07/29/2019
16+
ms.date: 08/12/2019
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -33,7 +33,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
3333

3434
To get started, you need the following items:
3535

36-
* An Azure AD subscription. If you don't have a subscription, you can get one-month free trial [here](https://azure.microsoft.com/pricing/free-trial/).
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3737
* Expensify single sign-on (SSO) enabled subscription.
3838

3939
## Scenario description
@@ -53,20 +53,20 @@ To configure the integration of Expensify into Azure AD, you need to add Expensi
5353
1. In the **Add from the gallery** section, type **Expensify** in the search box.
5454
1. Select **Expensify** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5555

56-
## Configure and test Azure AD single sign-on
56+
## Configure and test Azure AD single sign-on for Expensify
5757

5858
Configure and test Azure AD SSO with Expensify using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Expensify.
5959

6060
To configure and test Azure AD SSO with Expensify, complete the following building blocks:
6161

6262
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
63+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
64+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
6365
2. **[Configure Expensify SSO](#configure-expensify-sso)** - to configure the Single Sign-On settings on application side.
64-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
65-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
66-
5. **[Create Expensify test user](#create-expensify-test-user)** - to have a counterpart of B.Simon in Expensify that is linked to the Azure AD representation of user.
66+
1. **[Create Expensify test user](#create-expensify-test-user)** - to have a counterpart of B.Simon in Expensify that is linked to the Azure AD representation of user.
6767
6. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6868

69-
### Configure Azure AD SSO
69+
## Configure Azure AD SSO
7070

7171
Follow these steps to enable Azure AD SSO in the Azure portal.
7272

@@ -81,11 +81,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
a. In the **Sign on URL** text box, type a URL:
8282
`https://www.expensify.com/authentication/saml/login`
8383

84-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
85-
`https://www.<companyname>.expensify.com`
84+
b. In the **Identifier (Entity ID)** text box, type a URL:
85+
`https://www.expensify.com`
86+
87+
c. b. In the **Reply URL** text box, type a URL using the following pattern:
88+
`https://www.expensify.com/authentication/saml/loginCallback?domain=<yourdomain>`
8689

8790
> [!NOTE]
88-
> The Identifier value is not real. Update this value with the actual Identifier. Contact [Expensify Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
91+
> The Reply URL value is not real. Update this value with the actual Reply URL. Contact [Expensify Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8992

9093
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Metadata XML** and select **Download** to download the certificate and save it on your computer.
9194

@@ -95,20 +98,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9598

9699
![Copy configuration URLs](common/copy-configuration-urls.png)
97100

98-
### Configure Expensify SSO
99-
100-
To enable SSO in Expensify, you first need to enable **Domain Control** in the application. You can enable Domain Control in the application through the steps listed [here](https://help.expensify.com/domain-control). For additional support, work with [Expensify Client support team](mailto:[email protected]). Once you have Domain Control enabled, follow these steps:
101-
102-
![Configure Single Sign-On](./media/expensify-tutorial/tutorial_expensify_51.png)
103-
104-
1. Sign on to your Expensify application.
105-
106-
2. In the left panel, click **Settings** and navigate to **SAML**.
107-
108-
3. Toggle the **SAML Login** option as **Enabled**.
109-
110-
4. Open the downloaded Federation Metadata from Azure AD in notepad, copy the content, and then paste it into the **Identity Provider Metadata** textbox.
111-
112101
### Create an Azure AD test user
113102

114103
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -139,11 +128,25 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
139128
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
140129
1. In the **Add Assignment** dialog, click the **Assign** button.
141130

131+
## Configure Expensify SSO
132+
133+
To enable SSO in Expensify, you first need to enable **Domain Control** in the application. You can enable Domain Control in the application through the steps listed [here](https://help.expensify.com/domain-control). For additional support, work with [Expensify Client support team](mailto:[email protected]). Once you have Domain Control enabled, follow these steps:
134+
135+
![Configure Single Sign-On](./media/expensify-tutorial/tutorial_expensify_51.png)
136+
137+
1. Sign on to your Expensify application.
138+
139+
2. In the left panel, click **Settings** and navigate to **SAML**.
140+
141+
3. Toggle the **SAML Login** option as **Enabled**.
142+
143+
4. Open the downloaded Federation Metadata from Azure AD in notepad, copy the content, and then paste it into the **Identity Provider Metadata** textbox.
144+
142145
### Create Expensify test user
143146

144147
In this section, you create a user called B.Simon in Expensify. Work with [Expensify Client support team](mailto:[email protected]) to add the users in the Expensify platform.
145148

146-
### Test SSO
149+
## Test SSO
147150

148151
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
149152

0 commit comments

Comments
 (0)